Help Net Security
Tips for guarding against mobile malware threats
In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …
Phishing attacks rise year over year
Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …
HP Intelligent Management Center multiple vulnerabilities
Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …
Free credit and identity theft protection service
TrustedID launched IDSafe, a free consumer credit and identity theft protection service to provide core coverage at absolutely no cost. IDSafe provides consumers a free credit …
WatchGuard introduces next-generation firewall
WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …
Explosive financial malware targets Windows
Trusteer identified Sunspot, a little known Windows malware platform that has been in circulation for some time, but was never previously recognized for its financial fraud …
Protect, share and sync data remotely
Trend Micro announced SafeSync for Business to help even the smallest companies securely save, manage and access their digital files from anywhere at any time, while …
Visa unveils new payments solutions
Visa today announced the next generation of payments solutions that include a secure cross-channel digital wallet and a range of customized mobile payments services. The …
BackTrack 5 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Exponent CMS multiple vulnerabilities
Multiple vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks and disclose sensitive …
Majority not prepared for IPv6 transition
88% of business networks were not fully ready for a change to IPv6, with two thirds (66.1%) saying their networks are only 0-20% ready, despite the fact that the last blocks …
Run OS X, Windows and Linux side-by-side on a Mac mini
Parallels Server for Mac 4.0 Mac mini Edition lets businesses turn an Apple Mac mini server running Mac OS X Server into a multi-purpose platform capable of running Mac OS X, …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations